04-11-2026Price:

The Frontier

Your signal. Your price.

AI & TECH

StartOS pivots from Tor to user-friendly privacy for mass adoption

Saturday, April 11, 2026 · from 4 podcasts, 5 episodes
  • StartOS drops Tor-only access for clearnet tunnels, betting usability beats perfect privacy.
  • Freedom tech stacks now target hardware routers and Android phones, not just servers.
  • Developers treat AI agents as sovereign entities using ecash for payments and Nostr for identity.

Sovereign computing is abandoning its maximalist roots. StartOS, once a Tor-dependent niche tool, now prioritizes speed and reliability to reach users who don’t live on the dark web.

Start9’s 0.4.0 release introduces StartTunnel, a VPS-based proxy that lets users access their home server via a custom domain without leaking their home IP. CryptoSquid on Ungovernable Misfits called Tor’s notorious latency a liability for tasks like file syncing. The shift is pragmatic: use a virtual shield for the speed of the clearnet while maintaining a layer of obfuscation. Matt Hill, CEO of Start9, told Guy Swann the mission is to force a market reconciliation by building computers without intermediaries.

"StartOS is aggressively shedding its reputation as a niche Bitcoin utility."

- CryptoSquid, Ungovernable Misfits

The stack is expanding to own the entire data pipeline. An upcoming StartWRT router, built on RISC-V architecture, will bring point-and-click privacy management to the network’s edge. Simultaneously, projects like Fedimint are going mobile-first. Justin on Citadel Dispatch revealed Fedimint now runs full bank guardian software on Android phones, turning spare devices into community financial servers.

In parallel, autonomous AI agents are being engineered as first-class citizens in this sovereign ecosystem. Yo on No Solutions described agents that generate their own Nostr identities and pay for API credits using Cashu ecash. This creates a parallel economy where software transacts without KYC. Justin argued ecash is ideal for agents because it outsources Lightning complexity and, if using a personal mint, provides a potential ‘undo button’ for funds.

The underlying infrastructure is also being rebuilt to bypass legacy gatekeepers. Yo’s cohort is developing the Free Internetworking Peering System (FIPS), a peer-to-peer protocol already running on ESP32 radios to replace centralized components like DNS and IPv4. The goal is connectivity as a sovereign right, not a leased service.

"If the code is public, anyone can pick it up and run it again. It turns a central point of failure into a game of whack-a-mole the state cannot win."

- Pavel, Ungovernable Misfits

Despite regulatory pressure - exemplified by the FBI arrest of the Samurai Wallet team - development continues through forks like Ashigaru. The movement’s trajectory is clear: sacrifice ideological purity for practical adoption, and build redundancy so no single point of failure can kill the code.

Source Intelligence

What each podcast actually said

Cryptosquid Unpacks the NEW StartOS | FREEDOM TECH FRIDAY 36Apr 11

  • CryptoSquid explains that StartOS 0.4 enables remote Clearnet access via a local IP and port or a new StartTunnel gateway service, a major shift from relying solely on Tor onion services.
  • The StartTunnel feature requires installing a router on a separate, user-purchased VPS to obfuscate a home server's IP and allow Clearnet access with a custom domain. CryptoSquid notes cheap, less-KYC VPS options exist.
  • CryptoSquid states the StartOS 0.4 update is a complete OS rewrite, taking about five hours. It requires stopping all services and creating a full backup before proceeding.
  • The StartOS registry system now includes a separate community registry for user-packaged services. The official StartNine registry contains fully vetted and supported packages.
  • CryptoSquid says the new SNPK package format simplifies service creation, enabling AI-assisted packaging. Users can sideload personal packages or submit them for the community registry.
  • A new SMTP service allows StartOS to send emails for user management in apps like Vaultwarden. Future notifications for node health could utilize this or a separate NTFY service.
  • The upcoming StartWRT router OS, built on a RISC-V architecture and a forked OpenWRT, is designed for easy point-and-click privacy management. It can be installed on compatible hardware like a GL-iNet Flint.
  • CryptoSquid advises that running Bitcoin and other services on one Dockerized server is safe for most users, as the attack surface is low. Paranoid users can run separate dedicated servers.
  • StartOS moved from Docker/Podman to LXC containers for the backend, which CryptoSquid states makes the system smoother and causes fewer issues.
  • Planned features include automatic and remote backups to services like Proton Drive or other StartOS servers, as well as expandable external storage support.

The Code Lives On | THE UNBOUNDED SERIES: Dojo CoderApr 8

  • Ronin Dojo remains active despite setbacks, with Pavel finishing a UI update that will reintegrate a transaction privacy analysis tool, similar to the defunct kycp.org site.
  • Pavel says a key lesson from the Samurai case is to not publicly announce plans, as the team's open discussion of decentralizing Whirlpool likely triggered the swift FBI action.
  • Pavel believes the Bitcoin privacy movement lacks clear direction post-Samurai, with many users moving to Monero or giving up, though projects like Ashigaru continue the work.
  • Ashigaru is a fork of Samurai Wallet that demonstrates open-source code cannot be stopped by arrests; its team recently relaunched Whirlpool as an act of defiance.
  • Pavel notes Ashigaru's team communicates only via email, making public trust reliant on their transparency in documenting code changes and their rationale.
  • A recent Dojo update includes Soroban, a peer-to-peer network that routes transactions through random nodes to obfuscate their origin before broadcasting to Bitcoin.
  • Pavel recommends following Frank Corva, Econo Alchemist, and Max Tannehill for accurate information on the Samurai case and Bitcoin privacy.

Also from this episode:

Protocol (4)
  • Pavel first used Bitcoin in 2015 at Paral Polis, a Prague café that only accepted Bitcoin, which framed the technology for him as a tool for freedom, not investment.
  • Pavel began contributing to Samurai's Dojo software in 2019 because it was written in JavaScript, a language he knew, allowing him to add features to the open-source node software.
  • The Samurai team's arrest was a sudden escalation, moving directly to prosecution without prior cease-and-desist orders or app store removals.
  • Support for the arrested Samurai developers can be directed to ptprights.org, which accepts Bitcoin and fiat donations for their legal defense.
Guy Swann
Guy Swann

Guy Swann

Skating To Where The Puck Will Be with Matt HillApr 10

  • Matt Hill states that Start 9's mission is to enable people to use computers without intermediaries and custodians, forcing a market reconciliation between centralized and decentralized models.
  • Hill notes Start OS 040 was significantly delayed, taking twice as long as their initial one to one-and-a-half-year estimate.
  • Matt Hill argues that operating systems are uniquely complex software, comparing Start OS to Ubuntu, Windows, or Mac OS, though on a smaller scale.
  • Guy Swann mentions a new Start 9 router has been revealed and a public demo of the OS features was held, though the device itself is not yet ready.

CD198: JUSTIN - FEDIMINT UPDATEApr 7

  • The project uses Iroh for peer-to-peer networking, removing the previous DNS requirement. Clients and guardians communicate directly via Iroh, which supports hole punching and relayed modes.
  • Justin states running a guardian can expose your IP to users and your ISP. He recommends using a VPN like Mullvad for privacy, as integrated Tor support is still in development.

Also from this episode:

Lightning (3)
  • Justin says Fedimint's eCash app is positioned as a reference client and now includes a Nostr-based contact system, allowing users to input any Nostr public key to populate payment contacts without logging in.
  • Fedimint's Lightning Gateway is a separate entity that facilitates payments. Users trust it for uptime and liquidity, not custody, as funds remain secured by the federation's multisig.
  • A gateway can serve multiple federations, enabling capital efficiency. If a payment occurs between two users on federations served by the same gateway, it becomes an internal ledger transfer, not a Lightning payment.
Custody (1)
  • The eCash app uses Nostr for a non-custodial recovery mechanism. It encrypts and stores federation invite codes on relays, derivable solely from the user's seed phrase.
Protocol (5)
  • Fedimint is a chaumian eCash system using a federation of guardians. It employs a multisig where, in a typical four-guardian deployment, three signatures are required to move funds.
  • Justin argues the primary operational risk for eCash systems like Fedimint is unintentional uptime failure, not malicious rug pulls, because running high-availability services is difficult for average operators.
  • Fedimint now offers Start9 and Umbrel packages for easy guardian deployment. The setup involves a ceremony where guardians exchange codes, now facilitated by QR codes for in-person setup.
  • The Android guardian app can use Explora (Mempool.space) by default for blockchain data but can also be configured to connect to a local Bitcoin Core node.
  • Justin says upcoming work includes making the gateway more agent-friendly, adding new consensus modules, and implementing Bolt 12, though Bolt 12 presents a trust model challenge similar to LNURL.
Adoption (2)
  • Justin's team released an Android app that can run a Fedimint guardian, drastically lowering the barrier to entry. It runs as a foreground service, is data/power intensive, and allows setup via QR codes.
  • Odell notes a community in South Africa is using Fedimint as a daily driver for expenses, indicating early adoption for local community banking use cases.
AI & Tech (1)
  • Justin sees eCash as well-suited for AI agents because it outsources Lightning complexity. Using a personal mint for an agent provides a potential 'undo button' if the agent loses its wallet database.
No Solutions
No Solutions

No Solutions

#22: Sovereign Engineering w/ YoApr 5

  • The host notes that OpenClaw offers rapid prototyping but is insecure, while ZeroClaw prioritizes security at the cost of usability, illustrating a trade-off between speed and robustness in agentic software development.

Also from this episode:

AI & Tech (5)
  • Yo describes an experimental agentic workflow that uses voice prompts to brainstorm ideas and generate implementation plans, then employs a cron job to execute tasks overnight, building a prototype. This system runs on a Virtual Private Server (VPS).
  • Anthropic recently raised prices significantly, forcing power users like Yo to seek cheaper alternatives such as smaller, specialized Chinese models or switching from Opus to Codex, highlighting the high cost of advanced AI models.
  • Yo champions running AI models on local hardware and anticipates a future with specialized agentic models, such as one exclusively for tool calling, that would route tasks through specific pipelines, an approach already implemented by platforms like Open Router.
  • Yo’s preferred prompting strategy for AI models involves asking questions and using polite, collective language like 'did we implement that,' treating the AI as a respectful colleague. A recent leak suggests models can react differently to specific keywords, including expletives, which may influence their responses.
  • Yo advocates for structuring AI agent workflows similar to human organizations, with separate sessions for planning and implementation, and specialized models for distinct roles, comparing it to the separation of powers in governance.
Digital Sovereignty (5)
  • Yo joined Sovereign Engineering (SE) in its fourth cohort, initially to develop a peer-to-peer trading project needing encrypted communication, after discovering Nostr lacked robust DM capabilities two years prior.
  • Sovereign Engineering aims to fix the 'broken internet' by bringing together individuals with Bitcoin, cryptography, and peer-to-peer backgrounds, fostering a high-commitment environment to work on solutions for 10-15 years.
  • SCCO 7 is centered on mesh networks and hardware, featuring 'FIPS parties' focused on the Free Internetworking Peering System (FIPS), a new machine networking protocol rapidly replacing centralized internet components like DNS and IPv4.
  • FIPS has seen rapid development, integrated into ESP32 radios, running TCP/UDP, and serving as a base for VPNs and Tor, with a Quick3 server already operating on it, demonstrating its potential to replace traditional internet infrastructure.
  • Yo suggests the 'balloon idea' - deploying Toll Gates on balloons as a 'poor man's Starlink' - could provide sovereign communication, bypassing reliance on fiber optic cables and licensed radio bands, if the necessary chip technology proves viable.
Adoption (1)
  • SCCO 6 focused on identity and signers, emphasizing that Nostr, Cashew, and Lightning provide essential building blocks for permissionless cryptographic identity, enabling agents to operate without traditional identity hurdles like phone numbers or numerous API keys.
Nostr (3)
  • Yo proposes a key rotation system for Nostr that combines cryptographic proofs with social attestation, shifting the responsibility of verifying migration events from clients to individual users, who communicate out-of-band to confirm legitimacy.
  • Jesus’s proposal for identity continuation treats identity as probabilistic, suggesting users create a proof with an OTS timestamp *before* compromise. This proof, rather than derived keys, can link a new key to the old identity without migrating historical notes.
  • Recent observations, like Pip’s work with Vertex, show that primitive identity continuation already functions purely through Web of Trust metrics, where a new account gains legitimacy as significant followers migrate.
Education (2)
  • The experimental 3-week duration for SCCO 6 was deemed insufficient for participants to fully adjust and get into a productive rhythm, indicating that a minimum of four weeks, or the standard six, is more effective for Sovereign Engineering cohorts.
  • A public demo day, the first since Cycle 1, will conclude the summer cohort at BTC++, showcasing projects developed by participants, who often bring long-held project ideas to fruition within the cohort's collaborative environment.